Download presentation
Presentation is loading. Please wait.
Published byMartin Jennings Modified over 6 years ago
1
Cath Elvey North West Cyber Safety Programme Cyber Crime and
Cyber Security Assembly Secondary School Cath Elvey Good afternoon Work for youth fed young persons charity Going to speak about Cybercrime and Cyber Security #BeMore
2
A lot has changed in 30 years
Yes that was me on the left 30 years ago when I joined Cheshire Police. Its not just the police uniform that has changed, the ways that crimes are committed and the types of people that commit them are now totally different. Cyber crime is now a bigger problem than drugs, theft and robbery and this isn’t just a problem for the police though it is an issue for all of us in this room today. For the last two years of my police service I worked at the North West Regional Cyber Crime Unit investigating Cyber Crime’s and Cyber criminals in our area. I’m going to talk to you today about why you as a young person are particularly at risk from the cyber criminal, what you can do to defeat them and how this is actually in some ways good news for you.
3
The Internet and new devices provide us all with exciting opportunities to communicate, learn and be creative, however with all of these opportunities come inherent risks and potential pitfalls that you need to now about. Cybercrime is a fast-growing crime area because criminals take advantage of the speed, convenience and anonymity of the Internet to commit a wide range of crimes which know no borders, cause serious harm and pose a real threats to us all. The Office of National Statistics in 2016 released some worrying statistics – 1 in 10 people now victims of cyber crime offences, You are 20 times more likely to be a victim of cyber crime than robbery, Particularly worryingly for everyone in this room is that it has become clear that young people like you are being deliberately targeted by cybercriminals who seek to steal their identities and finances. Equally as worrying is that experience of the Police and the National Crime Agency that more and more young people are actually the ones who are committing cyber crime and a distinct pathway from online gaming is emerging. So if you are a gamer you need to make sure that you don’t unwittingly follow this path.
4
Become a Cyber Defender
Adopt good cyber security practices Use them at home and in school Talk to and promote good cyber security to your family and friends I’m asking you to become a Cyber Defender. 80% of cyber crimes can be prevented if we all follow the advice I am going to give you. If you do these things yourself and talk to your family and friends about it you will be helping to defeat the cybercriminal.
5
Understand Your Enemy The Cyber Criminal will Infect your devices with Malware Steal your passwords Hack into your accounts Steal your identity So as with all battles one of the first things we need to do is understand our enemy.
6
The Malware Parade There’s loads of it around !!!
Unfortunately we don’t have time to talk about what they all do but I will mention two because they are particularly a risk for young people. Virus Trojan Worm 4. Ransomware – this is malware that starts by encrypting (making unreadable unless you have a special key) all of your data and then once everything is encrypted a message appears which demands that you make a payment to the cyber criminal to get the decryption key (and therefore your data back) 5. RATS – these are also known as spyware and once a cyber criminal has a RAT installed on your device he can basically spy on everything you do including listening to any audio, viewing your webcam (and watching you), reading and copying your files, watching your screen – the list goes on. The most common ways of becoming infected with malware is by Clicking on a bad link on an or website Downloading an infected file from the Internet which could appear to be a genuine piece of software, music, video or image file. Inserting an infected USB into a device
7
Defeat Malware Make sure you update your operating system, browser and apps when prompted Use good security software (anti-virus) Think before you Click the Link !! There are a number of steps that you can take to defeat malware, these three are the main ones that you need to know about. 1. Out of date operating systems, web browsers and applications contain security weaknesses which the cyber criminal can take advantage of to get malware onto your device or hack into it. Updating these things repairs the weaknesses and so makes the cybercriminal job much harder. So always allow updates as soon as you are prompted. 2. Install security software - anti – virus, Security software also called Anti-Virus is a program or set of programs that are designed to prevent, search for, detect, and remove malware like worms, Trojans, adware, and more. Make sure you buy a reputable product that performs regular scans ideally automatically Its estimated that there are hundreds of new examples of malware released every day and so it is an ongoing battle for security software companies to identify them and include them in their database of known malware signatures. 3. Think before you click the link Links on websites and social media sites and sent via are a common way that cyber criminals get malware onto devices.
8
And because of Ransomware
Whilst backing up your data will not stop you becoming the victim of ransomware it will reduce the impact if you are.
9
Manage your Digital Footprint
Defeat the Hacker Manage your Digital Footprint Use Strong Passwords The two key means of defeating the hacker who is going to try and steal your passwords and or identity and hack into your accounts are to Manage your digital footprint Use strong passwords
10
Digital Footprint / Tattoo
The mark that is left behind when you use the internet the content that you create, post and share Often called the digital tattoo as it is actually difficult to erase once it exists Also includes content that others post, and share, about you Personal information which has been obtained from social network sites can be used by cyber criminals for a wide variety of purposes against you including:- • to stalk or harass • to further cyberbullying • to identify potential victims for online grooming • to commit identity theft • to craft social engineering tactics to dupe victims into giving sensitive personal or account information • to identify user social media or financial accounts for hacking Restricting who can see your digital footprint and managing its content is therefore vital for all internet users including young people. Its not just cybercriminals who are interested in your digital footprint future employers, boyfriends and girlfriends, the press and lawyers may also be really interested in it.
11
Would you want a future employer to see these ??
Sharing photographs of yourself online can be risky for a number of reasons but mainly because once you post or send it to someone else you lose all control over it. It can be shared with other who you may not want to see and used against you. Just because you trust someone today doesn’t mean that you will be able to trust that person tomorrow, next week, next moth or next year. I’m sure we can all think of people who we have been really good friends with but have then had a fall out. If you follow the rule of only ever sharing photographs that you would be happy for parents, grandparents and teachers to see you won’t go far wrong.
12
Digital Footprint Checklist
Search yourself online Check privacy settings Think before you post Deactivate and delete Make a positive footprint Childnet Checklist Search yourself online: Do you know what is online about you? Do a simple web search of your name and see what you can find. If you find something you aren’t happy with, take the necessary steps to get that content removed. Remember, if your Facebook or Twitter pages appear you can change this by adjusting your privacy settings. Check privacy settings: make sure you know what information you are sharing on the websites you use, in particular on social networking sites. Most social networking sites have privacy settings to help you manage the content you share and who you share it with; you can decide if you want your posts to be shared with your online friends and followers only or with the public. Keep in mind that your friend’s content and their settings can also affect your digital footprint. Think before you post: before you post that funny picture of your friend, or make that joke about someone on Twitter, ask yourself do you want everyone to see it; friends, family, grandparents, future employers? Would you be happy for others to post that type of content about you? You should be proud of everything you post online, remember once it is online it could potentially be there forever! Deactivate and delete: when you stop using a social networking profile or website, it’s a good idea to deactivate or delete your account. This will mean the content is no longer live and should not be searchable online; it will also remove the risk of these accounts being hacked without you knowing. Make a positive footprint: we hear a lot about the negative footprints left behind online. The best way to keep your online reputation in check is to use your time online to get creative and create a positive footprint. For example why not write a blog to promote all the great things you are doing, fundraise for a charity using an online sponsorship page or create a video to teach others something new?
13
Use Strong Passwords 3 Random Words
Snow Cold Hat Passwords are what we use to protect our online information so that someone else cannot log into our online accounts. If the cyber criminal can guess or acquire your password it makes it easy for him to hack into your accounts and steal your data and money. To create a strong password it is now recommended that you simply choose three random words as this makes for a long passwords Numbers and symbols can be used to make it stronger. You should never use any word which is related to you and may be easy to guess, for example by looking at your social media pages. Absolutely never use: • Current partner’s name • Child’s name • Other family members’ name • Pet’s name • Place of birth • Favourite holiday • Something related to your favourite sports team
14
Use a Password Rule Example Password Rule
I will take my strong password but will make it different for each by starting it with the first letter of the website and ending with the last letter followed by the number of letters in the website name Example Password = SnowColdHat For Facebook the password would be FSnowColdHatk8 For Snapchat the password would be SSnowColdHatt8 The easiest way to make sure that you have a different password for each website is to use an algorithm based upon the URL of the website you are using. You create an algorithm with steps that you can remember, for example:- An algorithm which could be used could be to use your strong password as above but to change it each time by starting with the first letter of the website and to end it with the last letter followed by the number of letters in the url. This is really simple I suggest that you make your rule different.
15
What does the Cyber Criminal look like?
There are a number of different types of cyber criminal Hactivists who commit cyber crime because of a political or social point they want to make The typical hacker who spends hours in darkened rooms hacking into big business or governments Russian cyber criminal who write and sell the malware Or you – the experience of the police and National Crime Agency is that lots of cyber crime is being committed by young people just like you Many do it for fun without realising the consequences of their actions, but the penalties can be severe
16
Gaming Rules – Cyber Crimes
It’s not OK to log into or read information on someone else’s computer / account without their permission even if it’s just in a game Taking someone else’s virtual property even in a game is not ok It’s not OK to do anything to anyone else’s computer that will stop it from working – even if it’s in a game You are not allowed to have any tools (programmes/apps) which will allow you to access someone else’s computer or to stop it working (attack it) without their permission
17
Cyber Crime Consequences
The consequences are severe and include arrest, interview, seizure of all devices, and criminal conviction which will affect job opportunities and ability to travel to other countries.
18
Its not all bad news !! Cyber Security is a rapidly expanding and fast paced industry There will be a worldwide shortage of 1.5 million information security professionals by 2020 This presents exciting career opportunities for young people like you !! From CSI: Cyber to James Bond’s smart young techie sidekick ‘Q’, cyber security is being portrayed as an exciting, different and cutting-edge career. This glamorous Hollywood film image is not that far from real life! Cyber security experts are among the most prized professionals worldwide. Exports of UK cyber products and services are growing by over 15% a year. That means plenty of opportunities for UK cyber professionals to work overseas. So, if you have always wanted to travel the world and experience life in other countries, a career in cyber security might just be your passport to success and open doors to exciting opportunities, from Africa, Asia and Australia to mainland Europe, Canada and the USA.
19
Make being a Cyber Defender your career option
There are a wide range of roles in Cyber Security for both males and females – Cyber Security is also a really exciting career with lots of opportunities for girls. Some examples of cyber security careers are:- Penetration Tester / Ethical Hacker Malware Analyst Chief Information Security Officer (CISO) Information Risk Manager Digital Forensics Cyber Security Researcher If you are interested in getting more information about any of these careers speak to Miss Farley and Lawson
20
As you can see from this slide the answer is £67,439 per year or £35 per hour which is significantly higher than many other careers.
21
Develop your Cyber Skills
23
Cath Elvey catherinee@youthfed.org
#BeMore
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.